Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 64947 - dev-tex/latex2rtf: Buffer Overflow Lets Remote Users Execute Arbitrary Code
Summary: dev-tex/latex2rtf: Buffer Overflow Lets Remote Users Execute Arbitrary Code
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All All
: High normal (vote)
Assignee: Gentoo Security
URL: http://securitytracker.com/id?1011367
Whiteboard: ~2 [ebuild+] vorlon
Keywords:
Depends on:
Blocks:
 
Reported: 2004-09-22 03:35 UTC by Matthias Geerdsen (RETIRED)
Modified: 2011-10-30 22:40 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
extracted Debian patch (latex2rtf.patch,1.32 KB, patch)
2004-09-22 03:37 UTC, Matthias Geerdsen (RETIRED)
no flags Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Matthias Geerdsen (RETIRED) gentoo-dev 2004-09-22 03:35:52 UTC
from SecurityTracker Alert ID: 1011367

Date:  Sep 21 2004
Impact:  Execution of arbitrary code via network, User access via network
Exploit Included:  Yes  
Version(s): 1.9.15
Description:
A vulnerability was reported in LaTeX2rtf. A remote user can create a specially crafted file that, when processed by LaTeX2rtf, will cause arbitrary code to be executed on the target system.

D. J. Bernstein reported that there is a buffer overflow in expandmacro() when copying user-supplied data. The overflow can be triggered to execute arbitrary code.

It is reported that there are buffer overflows in other parts of the code, including Environments and the TranslateCommand.
Impact:  A remote user can create a document that, when processed by the target user, will execute arbitrary code on the target user's system with the privileges of the target user.

Solution:
No solution was available at the time of this entry.
______________________________

Mail from DJB including an exploit can be found at http://securesoftware.list.cr.yp.to/archive/0/09

Debian Bug: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=272612
The full Debian patchset can be found at http://http.us.debian.org/debian/pool/main/l/latex2rtf/latex2rtf_1.9.15-2.diff.gz

latex2rdf is currenly ~arch masked
Comment 1 Matthias Geerdsen (RETIRED) gentoo-dev 2004-09-22 03:37:26 UTC
Created attachment 40153 [details, diff]
extracted Debian patch

This patch was extracted from the Debian patch set, it should be the relevant
one... please double check.

DJB noted btw, that there are more buffer overflows in latex2rdf.
Comment 2 Matthias Geerdsen (RETIRED) gentoo-dev 2004-09-22 03:42:04 UTC
s/latex2rdf/latex2rtf/ in comments ;-)

Comment 3 Matthias Geerdsen (RETIRED) gentoo-dev 2004-09-23 04:56:42 UTC
text-markup, can you look into this and apply the patch if appropriate
Comment 4 Matthias Geerdsen (RETIRED) gentoo-dev 2004-09-27 09:37:31 UTC
text-markup herd, could you please create a new ebuild to fix this vulnerability

this bug is now about 5 days old
Comment 5 Mamoru KOMACHI (RETIRED) gentoo-dev 2004-09-27 19:52:37 UTC
Sorry for the delay (I was not reading emails this weekend). I'll look into this one.
Comment 6 Mamoru KOMACHI (RETIRED) gentoo-dev 2004-09-27 22:40:24 UTC
I've verified and committed latex2rtf-1.9.15-r2.ebuild (and p.masked 1.9.15-r1).
Comment 7 Matthias Geerdsen (RETIRED) gentoo-dev 2004-09-28 04:38:13 UTC
Thanks usata :)

Closing, since keywords appear to be right already and no GLSA is needed (~arch packet).